Remediate Penetration Test Findings
To meet the “remediate penetration test findings” requirement, you must track exploitable penetration test findings to correction based on your risk assessment approach, then repeat penetration testing to verify the fixes worked. Your assessor will look for a closed-loop workflow: findings → risk rating → remediation → validation retest → evidence of closure. 1
Key takeaways:
- Remediation is not complete until you retest and can show the vulnerability or weakness is no longer exploitable. 1
- Prioritization must align to your documented risk assessment method under Requirement 6.3.1, not ad hoc severity labels. 1
- Evidence must tie each finding to an owner, a change, and a retest result that verifies correction. 1
“Remediate penetration test findings” is one of the easiest PCI DSS requirements to fail in practice because teams stop at “we applied a patch” and never close the loop with verification. PCI DSS is explicit: exploitable vulnerabilities and security weaknesses discovered in penetration testing must be corrected according to the risk posed by the issue, and penetration testing must be repeated to verify the corrections. 1
For a Compliance Officer, CCO, or GRC lead, the operational challenge is coordination: Security runs the test, Engineering owns fixes, IT may implement changes, and Compliance must present coherent evidence to an assessor. You need a repeatable workflow that (1) assigns risk and priority using your defined method, (2) drives remediation through a controlled change process, and (3) triggers targeted retesting with clear pass/fail criteria.
This page gives requirement-level implementation guidance you can put into operation quickly: who’s in scope, how to run the workflow step-by-step, what artifacts to retain, what auditors typically ask, and where programs break down. It’s written to help you build a defensible story in an assessment: “We found it, we fixed it, we proved it.”
Regulatory text
PCI DSS v4.0.1 Requirement 11.4.4 requires that exploitable vulnerabilities and security weaknesses found during penetration testing are corrected “in accordance with the entity’s assessment of the risk posed by the security issue as defined in Requirement 6.3.1,” and that penetration testing is repeated to verify the corrections. 1
Operator interpretation (what this means in real life):
- You need a documented way to decide how urgent a penetration test finding is (your Requirement 6.3.1 risk assessment approach). 1
- You must remediate the issue, not just document acceptance, if it is exploitable and in scope for correction under your risk process. 1
- You must retest to prove the fix actually removed exploitability or the weakness condition. A “fixed” ticket without retest results is not closed for this requirement. 1
Plain-English requirement statement
You must run a closed-loop remediation program for penetration test findings: assign risk using your defined method, fix the issue, then rerun penetration testing (targeted retest) to confirm the issue is no longer exploitable, and keep evidence that ties each step together. 1
Who it applies to (scope and operational context)
This requirement applies to entities that store, process, or transmit account data and to service providers whose people, processes, or systems can affect the security of the cardholder data environment (CDE). 2
Operationally, you should treat these as in scope for the workflow:
- CDE systems and networks tested during penetration testing, plus any connected systems that can impact CDE security (for example, identity systems, admin jump hosts, segmentation controls, and management networks).
- Third parties involved in penetration testing, remediation, or hosting. If a third party runs your environment (cloud MSP, managed WAF, managed SIEM), your contract and operating model must still support evidence collection and retesting on fixes that affect the CDE.
What you actually need to do (step-by-step)
Below is a practical operating procedure you can adopt as a control narrative and then run repeatedly.
1) Intake findings into a controlled tracking system
Goal: every pen test finding becomes a trackable record with an owner and scope context.
Minimum fields:
- Finding ID, report reference, affected asset/service, environment (prod/non-prod), and whether it touches CDE or connected-to-CDE components
- Evidence links (screenshots, exploit steps, payloads, affected endpoints)
- Assigned remediation owner (Engineering/IT) and control owner (Security)
- Status, dates, and change references
Tip: Don’t manage this in email threads. Use a ticketing system or GRC workflow that preserves history.
2) Classify and prioritize using your Requirement 6.3.1 risk approach
Goal: your prioritization is explainable and consistent.
Map each finding to:
- Exploitability and impact in your environment (not generic CVSS alone)
- Exposure (internet-facing vs internal, authenticated vs unauthenticated)
- Compensating controls (WAF rules, segmentation, hardening)
- Business criticality of the affected system
Your assessor will look for alignment to “the entity’s assessment of the risk posed,” so your remediation priority should clearly flow from your documented method. 1
Deliverable output: a prioritized remediation queue with target timeframes defined by you (policy/standard), plus escalation rules for high-risk items.
3) Decide remediation vs risk acceptance (and document it)
Goal: no silent exceptions.
For each finding, choose one:
- Remediate (most exploitable findings)
- Mitigate (reduce exploitability or impact via compensating controls, then retest to validate the mitigation)
- Accept (only with documented rationale and approval consistent with your governance)
Even if you accept risk, maintain evidence that the decision followed your process, with explicit ownership and periodic review triggers. This keeps the program auditable and prevents “accepted forever” drift.
4) Implement fixes through change control
Goal: fixes are deployed safely and are traceable.
For each remediation ticket, link:
- Code change / configuration change
- Change request or deployment record
- Test/QA evidence (as applicable)
- Rollback plan (as applicable)
- Approvals for production deployment
Common examples of “real fixes”:
- Remove vulnerable endpoints or methods; enforce authz checks server-side
- Patch or upgrade affected components; remove end-of-life libraries
- Harden configuration (TLS/ciphers, headers, file permissions)
- Fix segmentation/control-plane exposure (admin ports, SSH/RDP access paths)
5) Repeat penetration testing to verify corrections (retest)
Goal: prove the condition is no longer exploitable.
Build a retest plan that is:
- Finding-specific: retest the exact exploit path or weakness scenario from the report
- Bounded: focus on corrected components and related attack chains
- Independent enough to be credible: retest should be performed by qualified testers (internal or third party) with access to original evidence
Retest evidence should include:
- Retest date, tester identity/team, and scope
- Steps performed and expected outcomes
- Result: “cannot reproduce” plus supporting proof (logs, screenshots, tool output)
PCI DSS explicitly requires repeating penetration testing to verify corrections. Treat this as a hard gate before closure. 1
6) Close the loop and produce an assessor-ready closure packet
Goal: each finding has a clean, self-contained story.
A closure packet per finding (or per related group) should include:
- Original finding excerpt and severity/risk rating basis
- Remediation ticket(s) and change references
- Before/after evidence (config diff, version, screenshot)
- Retest evidence showing verification
- Final sign-off (Security control owner + system owner)
7) Management reporting and trend oversight
Goal: prevent repeat issues and show governance.
At a minimum, report:
- Open findings by risk tier and owner group
- Aging and exceptions (risk accepted, blocked by dependencies)
- Recurrence patterns (same root cause across teams)
This is also where tools like Daydream can help: centralize evidence mapping (finding → ticket → change → retest), maintain an audit-ready library, and keep ownership clear across Security, Engineering, and third parties without chasing screenshots at assessment time.
Required evidence and artifacts to retain
Keep artifacts that let an assessor re-perform the reasoning and verify closure:
Penetration testing artifacts
- Final penetration test report and detailed findings
- Scope statement showing tested assets and boundaries
- Tester qualifications/engagement documentation (as applicable)
Remediation governance
- Your documented risk assessment method that drives prioritization (ties to Requirement 6.3.1 reference) 1
- Remediation policy/standard (how findings are tracked, assigned, escalated, and closed)
- Risk acceptance records and approvals (if used)
Execution proof
- Tickets with ownership, timestamps, and remediation actions
- Change management records tied to each fix
- Patch/configuration evidence (before/after)
- Retest plan and retest results showing verification 1
Common exam/audit questions and hangups
Expect these lines of questioning:
- “Show me one finding end-to-end.” Auditors often sample a few items and check for traceability across artifacts.
- “How did you prioritize this?” If the answer is “CVSS said so,” you may fail the “in accordance with risk assessment” expectation. 1
- “Where is the retest evidence?” A closed Jira ticket is not retest evidence. 1
- “What about mitigations?” If you used a compensating control, they will ask how you validated it blocks the exploit path.
Frequent implementation mistakes (and how to avoid them)
Mistake 1: Closing findings after patching without retest.
Fix: make retest a required workflow state. Closure requires retest attachment. 1
Mistake 2: Treating the pen test report as a static PDF.
Fix: convert each finding into a tracked work item with an owner and due date policy.
Mistake 3: Risk ratings that cannot be explained.
Fix: document the criteria used for likelihood/impact and apply consistently; keep a short write-up in each ticket.
Mistake 4: “Mitigated” means “we added a WAF rule” with no validation.
Fix: retest the exploit scenario with the control in place; retain proof.
Mistake 5: Third-party blockers derail closure.
Fix: bake evidence and retest support into contracts/SOWs for third parties that affect CDE components; track dependencies explicitly.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so treat enforcement risk as indirect: failure here often surfaces during PCI assessments as an inability to prove remediation and validation. The business risk is straightforward: exploitable weaknesses can remain in production if you don’t retest, and you may not have defensible evidence during scoping, assessor testing, or follow-up. 1
Practical execution plan (30/60/90)
Because exact timeframes are your governance choice, use phased execution. Rename phases to fit your operating cadence.
First 30 days (stand up the closed loop)
- Publish a short remediation SOP for pen test findings: intake, prioritization, ownership, retest gate, closure packet checklist. 1
- Standardize ticket fields and required attachments (original evidence, change record, retest results).
- Define the handoffs: Security (triage) → Engineering/IT (fix) → Security/Test (retest) → Compliance (evidence QA).
Days 31–60 (run it on real findings)
- Backlog sweep: ingest recent pen test findings into the workflow.
- Hold weekly remediation review with decision logs (remediate/mitigate/accept).
- Start producing closure packets for completed items; test assessor-readiness with an internal “mock sample.”
Days 61–90 (make it durable)
- Add reporting for aging, exceptions, and recurring root causes.
- Integrate change management references automatically where possible.
- Centralize evidence storage and mapping (for example, in Daydream) so the next assessment is retrieval, not archaeology.
Frequently Asked Questions
Do we have to retest every single penetration test finding?
You must repeat penetration testing as needed to verify corrections for exploitable vulnerabilities and weaknesses you corrected. In practice, teams run targeted retesting scoped to the finding and related attack paths, then retain evidence of the retest result. 1
Can we mark a finding “accepted risk” instead of fixing it?
PCI DSS 11.4.4 focuses on correction and verification of corrections; if you accept risk, document the decision, rationale, and approvals under your risk governance so you can defend why correction was not performed. Keep the record tied to your risk assessment method. 1
What evidence is strongest for auditors?
The strongest package ties (1) the original finding evidence, (2) the specific remediation change, and (3) a retest that shows the exploit path no longer works. A single screenshot without context usually fails sampling.
Does a vulnerability scan count as the required “repeat penetration testing”?
A scan can support verification, but the requirement calls for repeating penetration testing to verify corrections; that implies validating exploitability and attack paths, not only the absence of a scanner finding. Keep retest steps aligned to what the tester originally demonstrated. 1
How do we handle findings owned by a third party service provider?
Treat the third party as an extension of your control chain: open a tracked item, require change evidence, and require retest results or support for retesting. Contract terms should support evidence delivery and timelines that meet your risk-based prioritization.
What if the system can’t be patched quickly due to business constraints?
Document the constraint, implement interim mitigations to reduce exploitability, and retest to confirm the mitigation blocks the demonstrated attack path. Keep an explicit plan and owner for the permanent fix, tied to your risk assessment approach. 1
What you actually need to do
Use the cited implementation guidance when translating the requirement into day-to-day operating steps. 3
Footnotes
Frequently Asked Questions
Do we have to retest every single penetration test finding?
You must repeat penetration testing as needed to verify corrections for exploitable vulnerabilities and weaknesses you corrected. In practice, teams run targeted retesting scoped to the finding and related attack paths, then retain evidence of the retest result. (Source: PCI DSS v4.0.1 Requirement 11.4.4)
Can we mark a finding “accepted risk” instead of fixing it?
PCI DSS 11.4.4 focuses on correction and verification of corrections; if you accept risk, document the decision, rationale, and approvals under your risk governance so you can defend why correction was not performed. Keep the record tied to your risk assessment method. (Source: PCI DSS v4.0.1 Requirement 11.4.4)
What evidence is strongest for auditors?
The strongest package ties (1) the original finding evidence, (2) the specific remediation change, and (3) a retest that shows the exploit path no longer works. A single screenshot without context usually fails sampling.
Does a vulnerability scan count as the required “repeat penetration testing”?
A scan can support verification, but the requirement calls for repeating penetration testing to verify corrections; that implies validating exploitability and attack paths, not only the absence of a scanner finding. Keep retest steps aligned to what the tester originally demonstrated. (Source: PCI DSS v4.0.1 Requirement 11.4.4)
How do we handle findings owned by a third party service provider?
Treat the third party as an extension of your control chain: open a tracked item, require change evidence, and require retest results or support for retesting. Contract terms should support evidence delivery and timelines that meet your risk-based prioritization.
What if the system can’t be patched quickly due to business constraints?
Document the constraint, implement interim mitigations to reduce exploitability, and retest to confirm the mitigation blocks the demonstrated attack path. Keep an explicit plan and owner for the permanent fix, tied to your risk assessment approach. (Source: PCI DSS v4.0.1 Requirement 11.4.4)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream